Deck 5: Protecting Information Resources

ملء الشاشة (f)
exit full mode
سؤال
An intrusion detection system (IDS)can protect networks against both external and internal access.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An intrusion detection system (IDS)cannot prevent denial-of-service (DoS)attacks.
سؤال
Social engineering is an example of an unintentional security threat.
سؤال
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
سؤال
Viruses can only be transmitted through sharing of infected files directly from one computer to another.
سؤال
Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
سؤال
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
سؤال
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
سؤال
A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
سؤال
In the context of security,social engineering protects the integrity of information resources.
سؤال
After examining an incoming packet,a firewall cannot reject that packet.
سؤال
Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.
سؤال
If a drive in a redundant array of independent disks (RAID)system fails,data stored on it can be reconstructed from data stored on the remaining drives.
سؤال
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
سؤال
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
سؤال
In the context of the CIA triangle,part of ensuring integrity is identifying authorized users and granting them access privileges.
سؤال
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
سؤال
Application-filtering firewalls are less expensive than packet-filtering firewalls.
سؤال
Social engineering is an attack that takes advantage of the backdoors in security systems.
سؤال
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
سؤال
A _____ travels from computer to computer in a network but it does not usually erase data.

A)worm
B)virus
C)Trojan horse
D)logic bomb
سؤال
To ensure confidentiality,accuracy,and integrity of data,a level 2 security system protects _____.

A)back-end systems
B)simple systems
C)complex systems
D)front-end systems
سؤال
A level 3 security system focuses on protecting _____ against intrusion,denial-of-service attacks,and unauthorized access.

A)back-end systems
B)corporate networks
C)users' work stations
D)front-end servers
سؤال
Which of the following indicates that a computer might be affected by a virus?

A)When the disk access is fast
B)When there are familiar messages on the screen
C)When programs suddenly increase in size
D)When the available memory space remains constant
سؤال
A level 1 security system is used to protect _____ against unauthorized access.

A)users' work stations
B)corporate networks
C)internal database servers
D)front-end servers
سؤال
The cost of setting up a virtual private network (VPN)is usually high.
سؤال
What is Spyware?

A)Spyware is software that secretly gathers information about users while they browse the Web.
B)Spyware is an attack that floods a server or a network.
C)Spyware is an encryption security that manages transmission security on the Internet.
D)Spyware is a type of Trojan program.
سؤال
In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

A)validity
B)confidentiality
C)integrity
D)availability
سؤال
_____ is the process of capturing and recording network traffic.

A)Sniffing
B)Phishing
C)Spoofing
D)Pharming
سؤال
Which of the following is true of a worm?

A)It is an independent program that can spread itself without attaching itself to a host program.
B)It is transmitted through a network or through e-mail attachments.
C)It is a self-propagating program code that is triggered by a specific time or event.
D)It enables the designer to bypass the system security and sneak back into the system later to access files.
سؤال
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.

A)Kernel
B)Spyware
C)Spam
D)Jira
سؤال
_____ is a computer crime that involves destroying or disrupting computer services.

A)Sabotage
B)Dumpster
C)Libel
D)Keystroke logging
سؤال
In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.

A)validity
B)confidentiality
C)integrity
D)availability
سؤال
In business continuity planning,a disaster recovery plan lists that backup facilities should never be shared in an attempt to reduce costs.
سؤال
When does spoofing occur?

A)It occurs when an illegitimate program poses as a legitimate one.
B)It occurs when a comprehensive security plan is being developed.
C)It occurs when a word is converted into a digital pattern.
D)It occurs when a firewall rejects the incoming data packets.
سؤال
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.

A)sniffing
B)screening
C)pharming
D)cybersquatting
سؤال
Which of the following is true of phishing?

A)It involves sending fraudulent e-mails that seem to come from legitimate sources.
B)It increases the speed of a system by reading universal product codes.
C)It monitors and records keystrokes and can be software or hardware devices.
D)It attempts to gain access to a network by posing as an authorized user.
سؤال
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.

A)validity
B)confidentiality
C)integrity
D)availability
سؤال
An ideal password should be eight characters or longer.
سؤال
The Committee on National Security Systems (CNSS)proposed another model for evaluating information security known as the _____.

A)McCumber cube
B)top-level domain (TLD)
C)Porter's model
D)CIA triad
سؤال
Which of the following is a biometric security measure?

A)Electronic tracker
B)Password
C)Firewall
D)Signature analysis
سؤال
In physical security measures,using _____ is an inexpensive way to secure a computer to a counter.

A)corner bolts
B)steel encasements
C)callback modems
D)passwords
سؤال
A(n)_____ is often used so remote users have a secure connection to an organization's network.

A)biometric security network
B)intrusion detection network
C)virtual private network
D)terminal resource network
سؤال
In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.

A)Trojan programs
B)worms
C)logic bombs
D)backdoors
سؤال
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

A)Intrusion detection systems
B)Proxy servers
C)Physical security measures
D)Magnetic tapes
سؤال
Which of the following is considered an intentional security threat?

A)Floods
B)Structural failures
C)Backdoors
D)Power outages
سؤال
Which of the following is a type of access control used to protect systems from unauthorized access?

A)Steel encasements
B)Passwords
C)Firewalls
D)Identification badges
سؤال
In the context of security threats,_____ takes advantage of the human element of security systems.

A)hand geometry
B)iris analysis
C)voice recognition
D)social engineering
سؤال
Which of the following is a physical security measure?

A)Fitting electronic trackers to a computer
B)Restricting access through passwords
C)Filtering data packets using a firewall
D)Checking a user's signature
سؤال
In the context of security threats,a _____ is a programming routine built into a system by its designer or programmer.

A)logic bomb
B)worm
C)virus
D)backdoor
سؤال
Which of the following is a nonbiometric security measure?

A)Electronic trackers
B)Passwords
C)Firewalls
D)Signature analysis
سؤال
In the context of security threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

A)magnetic disk
B)denial-of-service attack
C)backdoor
D)mirror disk
سؤال
Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others.

A)Physical security measure
B)Firewall security measure
C)E-commerce security measure
D)Biometric security measure
سؤال
In the context of security threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

A)blended threat
B)mirror disk
C)backdoor
D)magnetic disk
سؤال
_____ is an example of a biometric security measure.

A)Hand geometry
B)Firewalls
C)Callback modems
D)Passwords
سؤال
_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.

A)Nonbiometric
B)Physiological
C)Biometric
D)Physical
سؤال
Identify a true statement about firewalls.

A)Firewalls protect against external access and not from internal intrusions.
B)Firewalls can identify attack signatures,trace patterns,and generate alarms for the network administrator.
C)Firewalls monitor network traffic and use the "prevent,detect,and react" approach to security.
D)Firewalls cause routers to terminate connections with suspicious sources.
سؤال
Identify an intentional security threat that is a type of Trojan program used to release a virus,worm,or other destructive code.

A)Logic bomb
B)Fingerprint
C)Blended threat
D)Backdoor
سؤال
Which of the following is true of application-filtering firewalls?

A)They are more secure and flexible.
B)They control data traffic by configuring a router.
C)They act as an intermediary between two systems.
D)They can be used as a server to scan for malware and viruses.
سؤال
In nonbiometric security measure,a _____ is a software that acts as an intermediary between two systems.

A)database
B)backdoor
C)proxy server
D)Trojan program
سؤال
_________ is a form of spyware that collects information about a user (without the user's consent)to determine which advertisements to display in the user's Web browser.

A)Adware
B)Malware
C)Freeware
D)Hardware
سؤال
When planning a comprehensive security system,the first step is designing _________,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

A)fault-tolerant systems
B)vulnerability-evade systems
C)primary-defense systems
D)database-resilient systems
سؤال
_________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.

A)Spoofing
B)Keystroke logging
C)Phishing
D)Pharming
سؤال
_____ encryption is also known as secret key encryption.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
سؤال
_____ is a commonly used encryption protocol that manages transmission security on the Internet.

A)Application Layer
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
سؤال
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.

A)risk assessment
B)systems engineering
C)disaster recovery
D)security compliance
سؤال
_________ is software that secretly gathers information about users while they browse the Web.

A)Spyware
B)Firmware
C)Freeware
D)Malware
سؤال
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

A)Symmetric encryption
B)Business continuity planning
C)An intrusion detection system
D)Terminal resource security
سؤال
In data encryption,the https indicates a safe HTTP connection over _____.

A)Secure Sockets Layer
B)Transport Layer Security
C)User Datagram Protocol
D)Transmission Control Protocol
سؤال
_____ encryption uses a public key known to everyone and a private key known only to the recipient.​

A)​Symmetric
B)​Asymmetric
C)​Synchronous
D)​Asynchronous
سؤال
_________ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.

A)Computer fraud
B)Denial-of-service
C)Rootkit
D)Social engineering
سؤال
​In _____ encryption,the same key is used to encrypt and decrypt a message.

A)​symmetric
B)​asymmetric
C)​synchronous
D)​asynchronous
سؤال
Data sent through a virtual private network (VPN)can be encrypted using the _____.

A)User Datagram Protocol
B)Transmission Control Protocol
C)Host Identity Protocol
D)Layer Two Tunneling Protocol
سؤال
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?

A)Plaintext
B)Cleartext
C)Codetext
D)Ciphertext
سؤال
_________ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

A)Phishing
B)Spyware
C)Confidentiality
D)Public key encryption
سؤال
_____ encryption usually works better for public networks,such as the Internet.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
سؤال
The main function of Cyber Incident Response Capability (CIRC)is to _____.

A)provide level 1 security
B)restrict access controls to unauthorized personnel
C)provide information on security incidents
D)create backdoors to bypass security protocols
سؤال
_________ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

A)Keystroke loggers
B)Worms
C)Magnetic tapes
D)Mirror disks​
سؤال
In data encryption,a(n)_____ enables users of the Internet to securely and privately exchange data through the use of a pair of keys.

A)public key infrastructure
B)asymmetric encryption
C)symmetric encryption
D)private key infrastructure
سؤال
In data encryption,_____ ensures data security and integrity over public networks,such as the Internet.

A)Transport Layer Security
B)Terminal Resource Security
C)Transmission Control Security
D)User Datagram Security
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/108
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Protecting Information Resources
1
An intrusion detection system (IDS)can protect networks against both external and internal access.
True
2
An intrusion detection system (IDS)cannot prevent denial-of-service (DoS)attacks.
False
3
Social engineering is an example of an unintentional security threat.
False
4
Terminal resource security is a software feature that erases the screen and signs the user off automatically after a specified length of inactivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
5
Viruses can only be transmitted through sharing of infected files directly from one computer to another.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
6
Phishing is different from pharming as phishing usually involves hijacking an official Web site address by hacking a Domain Name System server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
7
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
8
Confidentiality,integrity,and availability are collectively referred to as the CIA triangle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
9
A proxy server is often used to help protect the network against unauthorized access from outside the network by hiding the network addresses of internal systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
10
In the context of security,social engineering protects the integrity of information resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
11
After examining an incoming packet,a firewall cannot reject that packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
12
Keystroke loggers can be used for malicious purposes,such as collecting the credit card numbers that users enter while shopping online.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
13
If a drive in a redundant array of independent disks (RAID)system fails,data stored on it can be reconstructed from data stored on the remaining drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
14
Level 1 security protects the back-end systems to ensure confidentiality,accuracy,and integrity of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
15
A distributed denial-of-service (DDoS)attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
16
In the context of the CIA triangle,part of ensuring integrity is identifying authorized users and granting them access privileges.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
17
When a program containing a virus is used,the virus attaches itself to other files,and the cycle continues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
18
Application-filtering firewalls are less expensive than packet-filtering firewalls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
19
Social engineering is an attack that takes advantage of the backdoors in security systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
20
When using mirror disks,if one of the two disks containing the same data fails,the other disk also fails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
21
A _____ travels from computer to computer in a network but it does not usually erase data.

A)worm
B)virus
C)Trojan horse
D)logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
22
To ensure confidentiality,accuracy,and integrity of data,a level 2 security system protects _____.

A)back-end systems
B)simple systems
C)complex systems
D)front-end systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
23
A level 3 security system focuses on protecting _____ against intrusion,denial-of-service attacks,and unauthorized access.

A)back-end systems
B)corporate networks
C)users' work stations
D)front-end servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following indicates that a computer might be affected by a virus?

A)When the disk access is fast
B)When there are familiar messages on the screen
C)When programs suddenly increase in size
D)When the available memory space remains constant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
25
A level 1 security system is used to protect _____ against unauthorized access.

A)users' work stations
B)corporate networks
C)internal database servers
D)front-end servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
26
The cost of setting up a virtual private network (VPN)is usually high.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
27
What is Spyware?

A)Spyware is software that secretly gathers information about users while they browse the Web.
B)Spyware is an attack that floods a server or a network.
C)Spyware is an encryption security that manages transmission security on the Internet.
D)Spyware is a type of Trojan program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
28
In the context of computer and network security,_____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

A)validity
B)confidentiality
C)integrity
D)availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
29
_____ is the process of capturing and recording network traffic.

A)Sniffing
B)Phishing
C)Spoofing
D)Pharming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is true of a worm?

A)It is an independent program that can spread itself without attaching itself to a host program.
B)It is transmitted through a network or through e-mail attachments.
C)It is a self-propagating program code that is triggered by a specific time or event.
D)It enables the designer to bypass the system security and sneak back into the system later to access files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
31
_____ can interfere with users' control of their computers,through such methods as installing additional software and redirecting Web browsers.

A)Kernel
B)Spyware
C)Spam
D)Jira
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
32
_____ is a computer crime that involves destroying or disrupting computer services.

A)Sabotage
B)Dumpster
C)Libel
D)Keystroke logging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
33
In the context of computer and network security,_____ means that computers and networks are operating and authorized users can access the information they need.

A)validity
B)confidentiality
C)integrity
D)availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
34
In business continuity planning,a disaster recovery plan lists that backup facilities should never be shared in an attempt to reduce costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
35
When does spoofing occur?

A)It occurs when an illegitimate program poses as a legitimate one.
B)It occurs when a comprehensive security plan is being developed.
C)It occurs when a word is converted into a digital pattern.
D)It occurs when a firewall rejects the incoming data packets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
36
Similar to phishing,_____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information,such as Social Security numbers,passwords,bank account numbers,and credit card numbers.

A)sniffing
B)screening
C)pharming
D)cybersquatting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which of the following is true of phishing?

A)It involves sending fraudulent e-mails that seem to come from legitimate sources.
B)It increases the speed of a system by reading universal product codes.
C)It monitors and records keystrokes and can be software or hardware devices.
D)It attempts to gain access to a network by posing as an authorized user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
38
In the context of computer and network security,_____ refers to the accuracy of information resources within an organization.

A)validity
B)confidentiality
C)integrity
D)availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
39
An ideal password should be eight characters or longer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
40
The Committee on National Security Systems (CNSS)proposed another model for evaluating information security known as the _____.

A)McCumber cube
B)top-level domain (TLD)
C)Porter's model
D)CIA triad
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following is a biometric security measure?

A)Electronic tracker
B)Password
C)Firewall
D)Signature analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
42
In physical security measures,using _____ is an inexpensive way to secure a computer to a counter.

A)corner bolts
B)steel encasements
C)callback modems
D)passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
43
A(n)_____ is often used so remote users have a secure connection to an organization's network.

A)biometric security network
B)intrusion detection network
C)virtual private network
D)terminal resource network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
44
In the context of intentional threats,_____ can erase data and wreak havoc on computers and networks,but they do not replicate themselves.

A)Trojan programs
B)worms
C)logic bombs
D)backdoors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
45
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.

A)Intrusion detection systems
B)Proxy servers
C)Physical security measures
D)Magnetic tapes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
46
Which of the following is considered an intentional security threat?

A)Floods
B)Structural failures
C)Backdoors
D)Power outages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following is a type of access control used to protect systems from unauthorized access?

A)Steel encasements
B)Passwords
C)Firewalls
D)Identification badges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
48
In the context of security threats,_____ takes advantage of the human element of security systems.

A)hand geometry
B)iris analysis
C)voice recognition
D)social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is a physical security measure?

A)Fitting electronic trackers to a computer
B)Restricting access through passwords
C)Filtering data packets using a firewall
D)Checking a user's signature
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
50
In the context of security threats,a _____ is a programming routine built into a system by its designer or programmer.

A)logic bomb
B)worm
C)virus
D)backdoor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
51
Which of the following is a nonbiometric security measure?

A)Electronic trackers
B)Passwords
C)Firewalls
D)Signature analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
52
In the context of security threats,a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

A)magnetic disk
B)denial-of-service attack
C)backdoor
D)mirror disk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
53
Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen,lost,copied,or passed on to others.

A)Physical security measure
B)Firewall security measure
C)E-commerce security measure
D)Biometric security measure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
54
In the context of security threats,a _____ combines the characteristics of computer viruses,worms,and other malicious codes with vulnerabilities found on public and private networks.

A)blended threat
B)mirror disk
C)backdoor
D)magnetic disk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
55
_____ is an example of a biometric security measure.

A)Hand geometry
B)Firewalls
C)Callback modems
D)Passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
56
_____ security measures primarily control access to computers and networks,and they include devices for securing computers and peripherals from theft.

A)Nonbiometric
B)Physiological
C)Biometric
D)Physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
57
Identify a true statement about firewalls.

A)Firewalls protect against external access and not from internal intrusions.
B)Firewalls can identify attack signatures,trace patterns,and generate alarms for the network administrator.
C)Firewalls monitor network traffic and use the "prevent,detect,and react" approach to security.
D)Firewalls cause routers to terminate connections with suspicious sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
58
Identify an intentional security threat that is a type of Trojan program used to release a virus,worm,or other destructive code.

A)Logic bomb
B)Fingerprint
C)Blended threat
D)Backdoor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following is true of application-filtering firewalls?

A)They are more secure and flexible.
B)They control data traffic by configuring a router.
C)They act as an intermediary between two systems.
D)They can be used as a server to scan for malware and viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
60
In nonbiometric security measure,a _____ is a software that acts as an intermediary between two systems.

A)database
B)backdoor
C)proxy server
D)Trojan program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
61
_________ is a form of spyware that collects information about a user (without the user's consent)to determine which advertisements to display in the user's Web browser.

A)Adware
B)Malware
C)Freeware
D)Hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
62
When planning a comprehensive security system,the first step is designing _________,which use a combination of hardware and software for improving reliability-a way of ensuring availability in case of a system failure.

A)fault-tolerant systems
B)vulnerability-evade systems
C)primary-defense systems
D)database-resilient systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
63
_________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information,such as passwords and credit card information.

A)Spoofing
B)Keystroke logging
C)Phishing
D)Pharming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
64
_____ encryption is also known as secret key encryption.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
65
_____ is a commonly used encryption protocol that manages transmission security on the Internet.

A)Application Layer
B)Secure Sockets Layer
C)Transmission Control Protocol
D)User Datagram Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
66
A _____ plan lists the tasks that must be performed to restore damaged data and equipment.

A)risk assessment
B)systems engineering
C)disaster recovery
D)security compliance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
67
_________ is software that secretly gathers information about users while they browse the Web.

A)Spyware
B)Firmware
C)Freeware
D)Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
68
_____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.

A)Symmetric encryption
B)Business continuity planning
C)An intrusion detection system
D)Terminal resource security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
69
In data encryption,the https indicates a safe HTTP connection over _____.

A)Secure Sockets Layer
B)Transport Layer Security
C)User Datagram Protocol
D)Transmission Control Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
70
_____ encryption uses a public key known to everyone and a private key known only to the recipient.​

A)​Symmetric
B)​Asymmetric
C)​Synchronous
D)​Asynchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
71
_________ is the unauthorized use of computer data for personal gain,such as transferring money from another's account or charging purchases to someone else's account.

A)Computer fraud
B)Denial-of-service
C)Rootkit
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
72
​In _____ encryption,the same key is used to encrypt and decrypt a message.

A)​symmetric
B)​asymmetric
C)​synchronous
D)​asynchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
73
Data sent through a virtual private network (VPN)can be encrypted using the _____.

A)User Datagram Protocol
B)Transmission Control Protocol
C)Host Identity Protocol
D)Layer Two Tunneling Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?

A)Plaintext
B)Cleartext
C)Codetext
D)Ciphertext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
75
_________ is sending fraudulent e-mails that seem to come from legitimate sources,such as a bank or university.

A)Phishing
B)Spyware
C)Confidentiality
D)Public key encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
76
_____ encryption usually works better for public networks,such as the Internet.

A)Symmetric
B)Asymmetric
C)Synchronous
D)Asynchronous
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
77
The main function of Cyber Incident Response Capability (CIRC)is to _____.

A)provide level 1 security
B)restrict access controls to unauthorized personnel
C)provide information on security incidents
D)create backdoors to bypass security protocols
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
78
_________ monitor and record the keys pressed on a keyboard and can be software or hardware devices.

A)Keystroke loggers
B)Worms
C)Magnetic tapes
D)Mirror disks​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
79
In data encryption,a(n)_____ enables users of the Internet to securely and privately exchange data through the use of a pair of keys.

A)public key infrastructure
B)asymmetric encryption
C)symmetric encryption
D)private key infrastructure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
80
In data encryption,_____ ensures data security and integrity over public networks,such as the Internet.

A)Transport Layer Security
B)Terminal Resource Security
C)Transmission Control Security
D)User Datagram Security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 108 في هذه المجموعة.